15.07.2013 Views

Computer Security Threat Monitoring and Surveillance

Computer Security Threat Monitoring and Surveillance

Computer Security Threat Monitoring and Surveillance

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.3 Summary<br />

In computer installations in general, security audit trails, if taken,<br />

are rarely complete <strong>and</strong> almost never geared to the needs of the security<br />

officers whose responsibility it is to protect ADP assets. The balance<br />

of this report outlines the considerations <strong>and</strong> general design of a sys­<br />

tem which prOvides an initial set of tools to computer system security<br />

officers for use in their jobs. The discussion does not suggest the<br />

elimination of any existing security audit data collection <strong>and</strong> distri­<br />

bution. Rather it suggests augmenting any such schemes with infor­<br />

mation for the security personnel directly involved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!